Windows 7 – Tips and Tricks

Accessing Administrative Shares (\HOSTNAMEc$)

From paulspoerry.com: To enable administrative shares you gotta make a registry change. Click on the orb and in the search box type ‘regedit’ and hit enter. Browse to

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesSystem

Add a new DWORD called “LocalAccountTokenFilterPolicy” and give it a value of 1. Reboot and yer done! (Applies to Vista too!)

Allow ICMP (ping) Requests Through Firewall

From howtogeek.com:
Right click ‘cmd’ from the start menu and select ‘Run as Administrator’, then

netsh firewall set icmpsetting 8 enable

and to enable again

netsh firewall set icmpsetting 8 disable

(Applies to Vista too!)

Get back your Quick Launch toolbar

From neowin.com:
1. Right-click the taskbar, choose Toolbars / New Toolbar
2. In the folder selection dialog, enter the following string and hit OK:
%userprofile%AppDataRoamingMicrosoftInternet ExplorerQuick Launch
3. Turn off the “lock the taskbar” setting, and right-click on the divider. Make sure that “Show text” and “Show title” are disabled and the view is set to “small icons”.
4. Use the dividers to rearrange the toolbar ordering to choice, and then lock the taskbar again.

Starting Windows Explorer from “My Computer”

From Tim Sneath’s Blog:
If you spend more time manipulating files outside of the documents folders than inside, you might want to change the default starting directory for Windows Explorer so that it opens at the Computer node:

To do this, navigate to Windows Explorer in the Start Menu (it’s in the Accessories folder). Then edit the properties and change the target to read:

%SystemRoot%explorer.exe /root,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Share

ICMP on Cisco ASA/PIX 7.x

Inbound ICMP through the PIX/ASA is denied by default. Outbound ICMP is permitted, but the incoming reply is denied by default.

Pings Inbound
Pings initiated from the outside, or another low security interface of the PIX, are denied be default. The pings can be allowed by the use of static and access lists or access lists alone. In this example, one server on the inside of the PIX is made accessible to external pings. A static translation is created between the inside address (10.1.1.5) and the outside address (192.168.1.5).

pix(config)#static (inside,outside) 192.168.1.5 10.1.1.5 netmask 255.255.255.255
pix(config)#access-list 101 permit icmp any host 192.168.1.5 echo
pix(config)#access-group 101 in interface outside

Pings Outbound
There are two options in PIX 7.x that allow inside users to ping hosts on the outside. The first option is to setup a specific rule for each type of echo message.

For example:

access-list 101 permit icmp any any echo-reply
access-list 101 permit icmp any any source-quench
access-list 101 permit icmp any any unreachable
access-list 101 permit icmp any any time-exceeded
access-group 101 in interface outside

This allows only these return messages through the firewall when an inside user pings to an outside host. The other types of ICMP status messages might be hostile and the firewall blocks all other ICMP messages.

Another option is to configure ICMP inspection. This allows a trusted IP address to traverse the firewall and allows replies back to the trusted address only. This way, hosts on all inside interfaces can ping hosts on the outside and the firewall allows the replies to return. This also gives you the advantage of monitoring the ICMP traffic that traverses the firewall. In this example, icmp inspection is added to the default global inspection policy.

For example:

policy-map global_policy
class inspection_default
inspect icmp


Pulled from Cisco.com

Share

Share